Public Bug Bounty Programs & Responsible Disclosures #BugBounty #SecurityPrograms #EthicalHacking #VulnerabilityDisclosure #HackerDirectory https://www.bugbountydirectory.com/
Bugbountydirectory
Bug Bounty Directory - List of bug bounty programs and responsible disclosure
A list of public bug bounty programs and responsible disclosures.
Ready for Post-Quantum TLS? #QuantumReady #PostQuantumTLS #PQC #CyberSecurity #FutureProofing https://qcready.com/
Qcready
QCready - Evaluate your TLS Quantum readiness
Run the QCReady TLS scan to see if your domain already supports hybrid Kyber/PQC handshakes and is prepared for post-quantum HTTPS.
Arbitrary App Installation on Intune Managed Android Enterprise BYOD #AndroidBYOD #WorkProfile #IntuneVulnerability #AppInstall #CVEBypass https://jgnr.ch/sites/android_enterprise.html
The Burn Notice, Part 3/5 | One Simple Mistake, Thousands at Risk https://medium.com/@attias.dor/the-burn-notice-3-5-one-simple-mistake-thousands-at-risk-996f85fcb92f
Medium
The Burn Notice, Part 3/5 | One Simple Mistake, Thousands at Risk
How Common Misconfigurations Could Lead to Massive Data Exposure
DoorDash allowed any business user to send arbitrary HTML emails from no-reply@doordash.com for 5 years #DoorDash #Disclosure #Security #GitLab #Public https://gitlab.com/mato.ferech/doordash-disclosure-public/-/blob/54535fa7b497e13100aa14f32a46f6aedb4aaf28/index.md
GitLab
index.md · 54535fa7b497e13100aa14f32a46f6aedb4aaf28 · Martin Ferech / DoorDash-Disclosure-Public · GitLab
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE #ASLRBypass #ROPChain #IOTSploitation #BufferOverflow #RCE https://modzero.com/en/blog/no-leak-no-problem/
Modzero
No Leak, No Problem – Bypassing ASLR with a ROP Chain to Gain RCE
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper #MacOSMalware #AppleScript #GatekeeperBypass #InfectionVector #SocialEngineering https://pberba.github.io/security/2025/11/11/macos-infection-vector-applescript-bypass-gatekeeper/
pepe berba
MacOS Infection Vector: Using AppleScripts to bypass Gatekeeper
A look at how threat actors are abusing AppleScript .scpt files to deliver macOS malware, from fake documents to browser update lures, and how these scripts ...
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101) #CitrixNetScaler #VulnerabilityResearch #MemoryLeak #ReflectedXSS #CVE202512101 https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/
watchTowr Labs
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)
There’s an elegance to vulnerability research that feels almost poetic - the quiet dance between chaos and control. It’s the art of peeling back the layers of complexity, not to destroy but to understand; to trace the fragile threads that hold systems together…
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446) #FortiWeb #AuthBypass #CVE202564446 #PathTraversal #Impersonation https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/
watchTowr Labs
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
The Internet is ablaze, and once again we all have a front-row seat - a bad person, if you can believe it, is doing a bad thing!
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
The first warning of such behaviour came from the great team at Defused:
As many are now aware, an unnamed (and potentially…
Disrupting the first reported AI-orchestrated cyber espionage campaign #FirstAIHack #AgenticAI #CyberEspionage #AutonomousAttacks #CybersecurityFuture https://www.anthropic.com/news/disrupting-AI-espionage
Anthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
A report describing an a highly sophisticated AI-led cyberattack
N-able N-central: From N-days to 0-days #NableNcentral #0DayExploits #AuthBypass #XXEAttack #DataBreach https://horizon3.ai/attack-research/attack-blogs/n-able-n-central-from-n-days-to-0-days/
Horizon3.ai
N-able N-central: From N-days to 0-days
Root cause analysis for N-able N-central CVE-2025-9163 and CVE-2025-11700 which allow for reading files and and potentially compromising the N-central database which stores client credentials, API keys, and more.
Gotchas in Email Parsing - Lessons From Jakarta Mail #EmailParsing #JakartaMail #SecurityVulnerabilities #ParsingDifferentials #RFCCompliance https://www.elttam.com/blog/jakarta-mail-primitives/
Elttam
Gotchas in Email Parsing - Lessons From Jakarta Mail - elttam
Learn the hidden quirks in Jakarta Mail that can lead to high-impact security bugs, and how to avoid them in your Java applications.
Discussion on assert(int+100 > int) optimized away in gcc https://gcc.gnu.org/bugzilla/show_bug.cgi?id=30475
Python packages to create extensive spy program #Python #SpyProgram #BlockHacks #Hacking #Surveillance https://audits.blockhacks.io/audit/python-packages-to-create-spy-program
BlockHacks
Python packages to create extensive spy program
This article dives deep into the emerging threat of covert audio‑and‑video exfiltration hidden inside seemingly harmless PDF attachments and lightweight Python scripts. It explains how attackers embed microphone listeners, webcam recorders, and motion‑triggered…
IPIPHistory - IP Address and BGP Route History Search #IPASNLookup #BGPRoutes #BGPHijack #NetworkIntelligence #RoutingAnalysis http://ipiphistory.com/
Ipiphistory
IPIPHistory - IP Address & BGP Route History Search
Free IP address, ASN lookup and BGP route history analysis tool with hijack detection.
Exploiting A Pre-Auth RCE in W3 Total Cache For WordPress <= 2.9.1 (CVE-2025-9501) #W3TotalCache #WordPress #RCE #CVE20259501 #PatchBypass https://www.rcesecurity.com/2025/11/exploiting-a-pre-auth-rce-in-w3-total-cache-for-wordpress-cve-2025-9501/
RCE Security | Penetration Tests. Source Code Reviews. IT Security Audits.
Exploiting A Pre-Auth RCE in W3 Total Cache … | RCE Security
We recently came across a very brief vulnerability announcement made by WPScan about CVE-2025-9501, which is described as an "Unauthenticated Command Injection" …
Lite XL — Arbitrary Code & Remote Code Execution (CVE-2025-12120 & CVE-2025-12121) #LiteXL #RCE #ArbitraryCode #CVEs #Security https://bend0us.github.io/vulnerabilities/lite-xl-rce/
BEND0US Offensive Security Notes
Lite XL — Arbitrary Code & Remote Code Execution (CVE-2025-12120 & CVE-2025-12121)
Lite XL versions 2.1.8 and earlier contain vulnerabilities that allow arbitrary code execution and can lead to Remote Code Execution.
Breaking Oracle’s Identity Manager: Pre-Auth RCE (CVE-2025-61757) https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/
Searchlight Cyber
Uncovering Oracle Identity Manager: Pre-Auth RCE (CVE-2025-61757)
Intro Earlier this year, in January, Oracle Cloud's login service (login.us2.oraclecloud.com) was breached—this led to the compromise of 6M records and over 140k Oracle Cloud tenants. Analysis showed that the threat actor had exploited an older CVE (CVE-2021…